FBI confirms they were behind Freedom Hosting's takeover

Posted on 16 September 2013.|Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which can cause cardiac arrest?Posted on 13 September 2013.|Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences.

London Underground cleaners to refuse fingerprint clock-on

Cleaners working on the London Underground will resort to industrial action this week in protest against the introduction of a controversial biometric clocking-in system.Starting at just after midnight on Thursday morning, "up to 300 cleaners" will join in the action by refusing to scan their fingerprints every time ...

"Stop spy on us!" 14 NASA sites hacked

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Don\\'t show me this againHi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security ...

How the US government inadvertently created Wikileaks

I was in Germany for Chaos Congress 2009, a hacker conference, and after attending a series of talks I was headed back to my hotel when I spotted Julian Assange. This predated my working as a project manager at DARPA as a hacker-in-residence, if you will. It was ...

Magic Lantern: Keyboard Recorder of the FBI

Rumors of Magic Lantern first hit the internet airwaves when Bob Sullivan, a prominent journalist and co-founder of MSNBC network, accused the FBI for using powerful keylogger software to aid in its investigations of extortion and harassment. The Bureau denied the allegations until official FBI documents produced in court proved that the FBI had developed the tool, in 2002 . This high-tech keyboard Recorder was capable of remote installation unlike previous keyloggers which had to be physically installed in a target computer. The documents further stated that the use of ...

Argentine teenage 'superhacker' held

Police in Argentina have arrested a 19 year-old man accused of heading a gang of hackers who targeted international money transfer and gambling websites. Dubbed "the superhacker", the teenager was making $50,000 (£31,500) a month, working from his bedroom in Buenos Aires, police say. The arrest operation shut ...

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted ...

New Passive Vulnerability Scanner (PVS) 4.0 Released

The Passive Vulnerability Scanner (PVS) version 4.0 was released today and is available to the public. It features a brand-new HTML5 web-based interface and a standalone version, allowing users to track and review vulnerabilities discovered from sniffing network traffic.View a two-minute video by Tenable Technical Product Manager Jack ...

IOActive Labs Research: Vulnerability bureaucracy: Unchanged after 12 years

One of my tasks at IOActive Labs is to deal with vulnerabilities; report them, try to get them fixed, publish advisories, etc. This isn\\'t new to me. I started to report vulnerabilities something like 12 years ago and over that time I have reported hundreds of vulnerabilities - many of them found by me and by other people too. It\\'s really sad to tell that, as of right now, 12 years later, I continue to see most (if not all) of the same problems. Not only that, but some organizations ...

The DRM market is rapidly evolving

‚ÄčThe digital rights management (DRM) market will grow at a rate of 12% annually to become a $1.2 billion market by 2018, while the related conditional access (CAS) market will decline slightly to dip below $1.5 billion annually.

Freaking out ScamWare scum

Apparently, the practice of manipulating people with fear into doing things that are not in their best interests is not illegal but the people who perpetrate this stuff are lower forms of life. Check out this video and score one for the human race.

1-in-5 tweets divulge user location

#doyouknowwhoswatchingyou? A new study from USC researchers sampled more than 15 million tweets, showing that some Twitter users may be inadvertently revealing their location through updates on the social media channel.

Australian site at center of hacking attack: takes down New York Times and Twitter

Syrian Electronic Army (SEA) hackers "broke into" Melbourne IT, an Australian Internet services company that claims Twitter and the New York Times as its customers.

Claim: Attackers can compromise iPhone via chargers and apps

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.

Navy turns to UAVs for help with radar, communications

Scientists recently launched unmanned aerial vehicles (UAVs) from a research vessel in a significant experiment that could help boost the Navy’s radar and communications performance at sea.

Scientists develop 'mathematical jigsaw puzzles' to encrypt software

UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as "software obfuscation," and it is reportedly the first time it has been accomplished.

Report: Eye-tracking could replace passwords if made user-friendly

It’s a wonder we still put up with passwords. We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.

Report: New hardware design protects data in the cloud

Cloud computing - outsourcing computational tasks over the Internet - could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.

Claim - this feature stops apps from stealing phone users' passwords

Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.

Shielding mesh networks from prying government eyes

Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.